Cryptology ePrint Archive: Report 2013/291
Security ranking among assumptions within the Uber assumption framework
Antoine Joux and Antoine Rojat
Abstract: Over the past decade bilinear maps have been used to build a large variety of cryptosystems. In parallel to new functionalities, we have also seen the emergence of many security assumptions. This leads to the general question of comparing two such assumptions. Boneh, Boyen and Goh introduced the Uber assumption as an attempt to offer a general framework for security assessment. Their idea is to propose a generic security assumption that can be specialized to suit the needs of any proof of protocols involving bilinear pairing. Even though the Uber assumption has been only stated in the bilinear setting, it can be easily restated to deal with ordinary Diffie-Hellman groups and assess other type of protocols.
In this article, we explore some particular instances of the Uber assumption; namely the n-CDH-assumption, the nth-CDH-assumption and the Q-CDH-assumption. We analyse the relationships between those assumption and more precisely from a security point of view. Our analysis does not rely on any special property of the considered group(s) and does not use the generic group model.
Category / Keywords: Diffie-Hellman, Computational, Reduction, Groups, Pairing, Adversarial Oracle
Original Publication (with minor differences): ISC 2013
Date: received 16 May 2013, last revised 24 Nov 2013
Contact author: antoine rojat at prism uvsq fr
Available format(s): PDF | BibTeX Citation
Version: 20131124:142209 (All versions of this report)
Discussion forum: Show discussion | Start new discussion
[ Cryptology ePrint archive ]